Autonomic Mul,- Agents Security System for mul,- layered distributed architectures. Chris,an Contreras
|
|
- Kelly Harris
- 6 years ago
- Views:
Transcription
1 Autonomic Mul,- s Security System for mul,- layered distributed architectures Chris,an Contreras
2 Agenda Introduc,on Mul,- layered distributed architecture Autonomic compu,ng system Mul,- System (MAS) Autonomic Mul, Security System JADE Framework Proposed solu,on features Conclusions Comments and ques,ons
3 Introduc,on Mul,- layered and distributed system architecture Characteris,cs : heterogeneity and complexity. Increase Cyber threats. à Security concerns grows. Maintain the SLO or SLA. We need security systems with a new approach. System that can response to current threats and future threats in a quicker and efficient way. Autonomic Compu,ng System (ACS) + Mul,- agent System(MAS) Autonomous system Self adap,ve Self protec,ng Knowledge Base à learning process
4 Mul,- layered distributed architecture
5 Architecture comparison Autonomic Compu,ng Proper,es Self- Configuring Self- Op,mizing Self- Healing Self- protec,ng MAPE- K Framework Define behavior Mul,- System Proper,es Autonomy Reac,vity Pro- ac,veness Social ability Desire Belief Inten,on (BDI) Model Define agent behavior
6 Autonomic Compu,ng Systems : MAPE- K framework Sensor Effector
7 Autonomic Compu,ng Systems : MAPE- K framework Monitor and collects the details from the managed resources using sensors. Analysis perform complex data analysis. It uses the stored knowledge data. Plan structures the ac,ons needed to achieve goals and objec,ves. Execute changes the behavior of the managed resource using effectors. Knowledge standard data shared that includes data such as topology informa,on, historical logs, metrics, symptoms and policies.
8 Autonomic Compu,ng System : Basic Proper,es
9 Mul, System proper,es Autonomy is the freedom that an agent has to make decisions. Reac;vity is the response to changes in the environment. Pro- ac;veness is the exhibi,ons of a goal- directed behavior. Social ability is the ability to successfully interact and cooperate with others agents.
10 BDI behavior model agents Desires (Goals) Beliefs (Knowledge Base) Sensor Input Interpreter (Reasoner) Event Queue Environment Plan Library (Procedural Knowledge) Inten,ons (Plan Instance) Inten,on Queue Ac;on Output
11 Mul, System Architecture Analysis Analysis Analysis Analysis Security Monitor Monitor 1 Monitor 1 1 Sensor Input Planning Planning Planning Manager Monitor Monitor 2 2 Environment Learning Learning Execu,oner Execu,oner Execu,oner Ac;on Output
12 Mul, System Architecture: Type of agents Reac,ve agent It reacts to an event and does not perform any kind of deduc,on. It always behaves in the same way. (pre- defined) Prac,cal reasoning agent It has a proac,ve behavior and make decisions on its own. First it deliberates what state of affairs to achieve Second it decides how to achieve the desired state of affairs. Predefined sets of ac,ons. (Plans) Deduc,ve reasoning agent There is a descrip,on of the environment. There are a set of rules. The agent deduces the appropriate set of ac,ons
13 Autonomic Mul,- Security System Desires (Goals) Plan Library (Procedural Knowledge) AMS DF Security Inten,ons (Plan Instance) Beliefs (Knowledge Base) Event Queue Sensor Effector Inten,on Queue
14 Autonomic Mul,- Security System JAVA DEvelopment (JADE) Framework
15 Autonomic Mul,- Security System JAVA DEvelopment (JADE) Framework
16 JADE Architecture Container: a running instance of the JADE run,me and may contain several agents (zero or more agents). PlaJorm: the set of all ac,ve containers Main container: First container to start in a pla]orm Must always be ac,ve All other containers (normal, non- main) must register with host and port of the main container. Special agents Management System (AMS). Provides the naming service Represents the authority Directory Facilitator (DF). Provides a Yellow Pages service Communica,on is based on an asynchronous message passing paradigm (ACL language).
17 Autonomic Mul,- Security System Containers External Knowledge Base Knowledge Base AMS Knowledge Base DF Main Container
18 Autonomic Mul,- Security System Cloud Mul,- layer Middleware Cross layer security Resources
19 Autonomic Mul,- Security System Mul,- layered distributed system. Cross Layer security. Mul, agents behave emula,ng the MAPE- K framework. Modeling the Security Knowledge Base with ontologies. Security policies, rules, threat signatures, etc. Supervised and unsupervised learning techniques to acquire new knowledge. s are light- weight process. Detect and react faster.
20 Autonomic Mul,- Security System JAVA DEvelopment (JADE) Framework. A fully distributed system inhabited by agents, each running as a separate thread, poten,ally on different remote machines, and capable of transparently communica,ng with one another. Full compliance with the FIPA specifica,ons. (Founda,on for Intelligent Physical s) Uses FIPA Communica,on Language (ACL). Efficient transport of asynchronous messages via a loca,on- transparent API. Support agent mobility. Support ontologies and content languages
21 Autonomic Mul,- Security System Self- Protec,ng à Secure Informa,on and Resources Predic,on Supervised and unsupervised techniques. Detec,on and Inform Monitor performance system metric, request analysis, log analysis, system corrup,on, data corrup,on, IDS. Build security traps. Iden,fy Aaack signatures, system vulnerabili,es, boalenecks, conges,on. Protec,on Change cryptographic system, communica,on protocols, ACM, flow control, etc., filter requests, drop requests, limit resource usage, limit resource access, block resources, etc.
22 Autonomic Mul,- Security System Agency trust model Security policies. Registra,on service Supervise behavior Upgrade process s autonomic security schema Self- protec,ng Self- healing Self- configuring Self- op,miza,on
23 Conclusion Autonomic Mul,- Security System for mul,- layered distributed architectures is a defense in depth approach. Autonomic Security System that can self- protec,ng, self- healing, self- configuring, self- op,miza,on itself. Knowledge base using ontologies can provide Adaptability for future threats. Reach and share knowledge across the web. JADE framework provides a solid pla]orm with poten,al grow. à Jena Apache Ontology API. s are light- weight processes that can accomplish scalability and portability. Provide support to maintain the SLA or SLO.
24 Comments and Ques,ons
Jade: Java Agent DEvelopment Framework Overview
Jade: Java Agent DEvelopment Framework Overview Stefano Mariani s.mariani@unibo.it Dipartimento di Informatica Scienza e Ingegneria (DISI) Alma Mater Studiorum Università di Bologna a Cesena Academic Year
More informationJade: Java Agent DEvelopment Framework Overview
Jade: Java Agent DEvelopment Framework Overview Multiagent Systems LM Sistemi Multiagente LM Stefano Mariani revised by Andrea Omicini s.mariani@unibo.it, andrea.omicini@unibo.it Dipartimento di Informatica:
More informationInfrastructure Analy=cs: Driving Outcomes through Prac=cal Uses and Applied Data Science at Cisco
Copyright 2016 Splunk Inc. Infrastructure Analy=cs: Driving Outcomes through Prac=cal Uses and Applied Data Science at Cisco MaM Birkner Ian Hasund Robert Novak Dis=nguished Engineer, Cisco Chief Architect,
More informationSecure Server Project. Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek
Secure Server Project Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek 1 Outline I. Mo9va9on, Objec9ves II. Threat Landscape III. Design IV. Status V. Roadmap 2 Mo9va9on In a nutshell: Secure
More informationProAc&ve Rou&ng In Scalable Data Centers with PARIS
ProAc&ve Rou&ng In Scalable Data Centers with PARIS Theophilus Benson Duke University Joint work with Dushyant Arora + and Jennifer Rexford* + Arista Networks *Princeton University Data Center Networks
More informationCHAPTER 7 JAVA AGENT DEVELOPMENT ENVIRONMENT
CHAPTER 7 JAVA AGENT DEVELOPMENT ENVIRONMENT 159 Chapter 7 Java Agent Development Environment For more enhanced information resources it requires that the information system is distributed in a network
More informationInformation Collection and Survey Infrastructure, APIs, and Software Tools for Agent-based Systems (An Overview of JADE)
Course Number: SENG 609.22 Session: Fall, 2003 Document Name: Infrastructure, APIs, and Software tools for agent-based system (An Overview of JADE) Course Name: Agent-based Software Engineering Department:
More informationOp#mizing MapReduce for Highly- Distributed Environments
Op#mizing MapReduce for Highly- Distributed Environments Abhishek Chandra Associate Professor Department of Computer Science and Engineering University of Minnesota hep://www.cs.umn.edu/~chandra 1 Big
More information1.1 Jadex - Engineering Goal-Oriented Agents
1.1 Jadex - Engineering Goal-Oriented Agents In previous sections of the book agents have been considered as software artifacts that differ from objects mainly in their capability to autonomously execute
More informationArchitectures, and Protocol Design Issues for Mobile Social Networks: A Survey
Applica@ons, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey N. Kayastha,D. Niyato, P. Wang and E. Hossain, Proceedings of the IEEEVol. 99, No. 12, Dec. 2011. Sabita Maharjan
More informationFIPA specification and JADE. Tomáš Poch
FIPA specification and JADE Tomáš Poch Agents System that is situated in some environment, and that is capable of autonomous action in this environment in order to meet its design objectives [Wooldridge
More informationTowards developing multi-agent systems in Ada G. Aranda, J. Palanca, A. Espinosa, A. Terrasa, and A. García-Fornes {garanda,jpalanca,aespinos,aterrasa,agarcia}@dsic.upv.es Information Systems and Computation
More informationSecuring Open- Source Databases in the Cloud Mike Frank, Director of Products
Securing Open- Source Databases in the Cloud Mike Frank, Director of Products Session Agenda Cyber- security fears and the risks to your data in the cloud Overview of cloud and virtualized infrastructures,
More informationCon$nuous Audi$ng and Risk Management in Cloud Compu$ng
Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Marcus Spies Chair of Knowledge Management LMU University of Munich Scien$fic / Technical Director of EU Integrated Research Project MUSING Cloud
More informationEvaluating and Improving Software Usability
Evaluating and Improving Software Usability 902 : Thursday, 9:30am - 10:45am Philip Lew www.xbosoft.com Understand, Evaluate and Improve 2 Agenda Introduc7on Importance of usability What is usability?
More informationCCW Workshop Technical Session on Mobile Cloud Compu<ng
CCW Workshop Technical Session on Mobile Cloud Compu
More informationApplying Data Visualiza0on to Analyze Ebola Call Center Trends
eh ea lth A F R I C A Applying Data Visualiza0on to Analyze Ebola Call Center Trends Sara Brown, MPH, CBIP Associate Crow Insight www.crowinsight.com Overview ehealth Africa & its role in figh=ng the Ebola
More informationPreliminary ACTL-SLOW Design in the ACS and OPC-UA context. G. Tos? (19/04/2016)
Preliminary ACTL-SLOW Design in the ACS and OPC-UA context G. Tos? (19/04/2016) Summary General Introduc?on to ACS Preliminary ACTL-SLOW proposed design Hardware device integra?on in ACS and ACTL- SLOW
More informationScalable Middleware Environment for Agent-Based Internet Applications]
Scalable Middleware Environment for Agent-Based Internet Applications] Benno J. Overeinder and Frances M.T. Brazier Department of Computer Science, Vrije Universiteit Amsterdam De Boelelaan 1081a, 1081
More informationDecision making for autonomous naviga2on. Anoop Aroor Advisor: Susan Epstein CUNY Graduate Center, Computer science
Decision making for autonomous naviga2on Anoop Aroor Advisor: Susan Epstein CUNY Graduate Center, Computer science Overview Naviga2on and Mobile robots Decision- making techniques for naviga2on Building
More informationToday s Objec4ves. Data Center. Virtualiza4on Cloud Compu4ng Amazon Web Services. What did you think? 10/23/17. Oct 23, 2017 Sprenkle - CSCI325
Today s Objec4ves Virtualiza4on Cloud Compu4ng Amazon Web Services Oct 23, 2017 Sprenkle - CSCI325 1 Data Center What did you think? Oct 23, 2017 Sprenkle - CSCI325 2 1 10/23/17 Oct 23, 2017 Sprenkle -
More informationWestern Michigan University
CS-6030 Cloud compu;ng Google App engine Sepideh Mohammadi Summer II 2017 Western Michigan University content Categories of cloud compu;ng Google cloud plaborm Google App Engine Storage technologies Datastore
More informationChapter 5 INTRODUCTION TO MOBILE AGENT
Chapter 5 INTRODUCTION TO MOBILE AGENT 135 Chapter 5 Introductions to Mobile Agent 5.1 Mobile agents What is an agent? In fact a software program is containing an intelligence to help users and take action
More informationCyber Security and Power System Communica4ons Essen4al Parts of a Smart Grid Infrastructure. Talal El Awar
Cyber Security and Power System Communica4ons Essen4al Parts of a Smart Grid Infrastructure Author: Goran N. Ericsson, Senior Member, IEEE Talal El Awar Submi.ed in Par3al Fulfillment of the Course Requirements
More informationOp#mizing PGAS overhead in a mul#-locale Chapel implementa#on of CoMD
Op#mizing PGAS overhead in a mul#-locale Chapel implementa#on of CoMD Riyaz Haque and David F. Richards This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore
More informationGetting DCIM Right the First or Second Time Around. PRESENTED BY Chris James CEO, DCIMPro
Getting DCIM Right the First or Second Time Around. PRESENTED BY Chris James CEO, DCIMPro Agenda: What are the Core Elements of DCIM? What is DCIM and why? The DCIM Maturation Model What is a Successful
More informationOp#mizing Websites for Results
MARKETING EDUCATION SERIES Op#mizing Websites for Results 10:00 AM 1:00 PM 3:00 PM David Warren VP Digital Media PennWell Objec5ve and Scope Of this Talk Objec5ve: To help you (marketers) make the most
More informationProf. Jacques Pasquier
Enhancing Communication within Complex Information Systems: An Agent Approach Prof. Jacques Pasquier 7/11/2008 Workshop: Reasoning, Inference, Decision and Other Things Department of Informatics, University
More informationCrea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed
Crea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed April 29 th 2015 Leon Gommans: leon.gommans@klm.com Content - Introduc@on - Security Autonomous
More informationDEGAS: Dynamic Exascale Global Address Space
DEGAS: Dynamic Exascale Global Address Space Katherine Yelick, LBNL PI Vivek Sarkar & John Mellor-Crummey, Rice James Demmel, Krste Asanoviç & Armando Fox, UC Berkeley Mattan Erez, UT Austin Dan Quinlan,
More informationIG-JADE-PKSlib. An Agent Based Framework for Advanced Web Service Composition and Provisioning. Erick Martínez & Yves Lespérance
IG-JADE-PKSlib An Agent Based Framework for Advanced Web Service Composition and Provisioning Erick Martínez & Yves Lespérance Department of Computer Science York University Toronto, Canada 1 Motivation
More informationMPI Performance Analysis Trace Analyzer and Collector
MPI Performance Analysis Trace Analyzer and Collector Berk ONAT İTÜ Bilişim Enstitüsü 19 Haziran 2012 Outline MPI Performance Analyzing Defini6ons: Profiling Defini6ons: Tracing Intel Trace Analyzer Lab:
More informationInteragency Advisory Board Meeting Agenda, Wednesday, December 5, 2012
Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012 1. Opening Remarks 2. The State Identity Credential and Access Management Guidance and Roadmap (SICAM) (Chad Grant, NASCIO) 3. PIV
More informationTwo Experiments with Service Composi4on: Trust/Privacy Management and Ac4on Planning for Mobile Robots. Mihhail Matskin KTH
Two Experiments with Service Composi4on: Trust/Privacy Management and Ac4on Planning for Mobile Robots Mihhail Matskin KTH 2 cases Exploi4ng Dynamic privacy in socially regularized recommenders Trust and
More informationDesign and Implementation of Multimedia Service Management Agent on Home Networks Environment
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July 2006 91 Design and Implementation of Multimedia Service Management Agent on Home Networks Environment Won-Joo Hwang,
More informationML4Bio Lecture #1: Introduc3on. February 24 th, 2016 Quaid Morris
ML4Bio Lecture #1: Introduc3on February 24 th, 216 Quaid Morris Course goals Prac3cal introduc3on to ML Having a basic grounding in the terminology and important concepts in ML; to permit self- study,
More informationIntroduction - GAMA. Gis & Agent-based Modeling Architecture. Agent-based, spatially explicit, modeling and simulation platform.
Econofisica / Econophysics, Prof. Terna Anno accademico 2016/2017 GAMA Gis & Agent-based Modeling Architecture JADE JAVA Agent DEvelopment Framework Dr. Jacopo Pellegrino - http://personalpages.to.infn.it/~japelleg/
More informationFIPA-OS Feature Overview. Agent Technology Group Nortel Networks February 2000
FIPA-OS Feature Overview Agent Technology Group Nortel Networks February 2000 FIPA-OS - Aims FIPA-OS is a Open Source implementation of FIPA and is available for free. http://www.nort elnetworks.com/ fipa-os
More informationSoftware Integration Using a Dynamic Wrapper Agent
Software Integration Using a Dynamic Wrapper Agent MIRIAM A. M. CAPRETZ & MARY C. HRYB Department of Electrical and Computer Engineering University of Western Ontario London, Ontario, CANADA N6A 5B9 Abstract:
More informationMapReduce, Apache Hadoop
Czech Technical University in Prague, Faculty of Informaon Technology MIE-PDB: Advanced Database Systems hp://www.ksi.mff.cuni.cz/~svoboda/courses/2016-2-mie-pdb/ Lecture 12 MapReduce, Apache Hadoop Marn
More informationMapReduce, Apache Hadoop
NDBI040: Big Data Management and NoSQL Databases hp://www.ksi.mff.cuni.cz/ svoboda/courses/2016-1-ndbi040/ Lecture 2 MapReduce, Apache Hadoop Marn Svoboda svoboda@ksi.mff.cuni.cz 11. 10. 2016 Charles University
More informationCORPORATE PRESENTATION
CORPORATE PRESENTATION Background on device detec/on (1/2) Identifying the capabilities of a device accessing web contents has been an extensively explored issue in the past years, in particular in the
More informationScaling the Wholesale Interconnect Market. Gastón Cu0gnola Senior Sales Engineer Telco Systems
Host Sponsor Co- Sponsor Scaling the Wholesale Interconnect Market Gastón Cu0gnola Senior Sales Engineer Telco Systems 1 Presenta0on Agenda Status of Wholesale/Interconnect Environments Moving up the curve
More informationYellow pages and Interaction Protocols
Yellow pages and Interaction Protocols Fabiano Dalpiaz Agent-Oriented Software Engineering (AOSE) 2009-10 Yellow pages How do you look for someone providing a service? Either you know a service provider......or
More informationHealth Monitoring Service for Multi-Agent Systems
Health Monitoring Service for Multi-Agent Systems MSc Thesis Final Report A thesis submitted in part fulfilment of the degree of MSc in Advanced Software Engineering with the supervision of Dr. Rem Collier
More informationWireless Mul*hop Ad Hoc Networks
Wireless Mul*hop Guevara Noubir noubir@ccs.neu.edu Some slides are from Nitin Vaidya s tutorial. Infrastructure vs. Ad Hoc Wireless Networks Infrastructure networks: One or several Access- Points (AP)
More informationA Distributed Data- Parallel Execu3on Framework in the Kepler Scien3fic Workflow System
A Distributed Data- Parallel Execu3on Framework in the Kepler Scien3fic Workflow System Ilkay Al(ntas and Daniel Crawl San Diego Supercomputer Center UC San Diego Jianwu Wang UMBC WorDS.sdsc.edu Computa3onal
More informationUse and Reuse of Multi-Agent Models and Techniques in a Distributed Systems Development Framework
Use and Reuse of Multi-Agent Models and Techniques in a Distributed Systems Development Framework Agostino Poggi, Michele Tomaiuolo Dipartimento di Ingegneria dell Informazione Università degli Studi di
More informationThe American University at Cairo. The Computer Science Department. Csci485-Intelligent Agents. Spring 2006 Dr Rafea. JADE Tutorial
The American University at Cairo The Computer Science Department Csci485-Intelligent Agents Spring 2006 Dr Rafea JADE Tutorial 1. Introduction Intelligent Agents have been extensively used in different
More informationScheduling with Energy & Network Constraints
Scheduling with Energy & Network Constraints Barna Saha College of Informa
More informationAmol Deshpande, University of Maryland Lisa Hellerstein, Polytechnic University, Brooklyn
Amol Deshpande, University of Maryland Lisa Hellerstein, Polytechnic University, Brooklyn Mo>va>on: Parallel Query Processing Increasing parallelism in compu>ng Shared nothing clusters, mul> core technology,
More informationFifty Years of Operating Systems. SIGOPS SOSP History Day October 4, 2015
Fifty Years of Operating Systems SIGOPS SOSP History Day October 4, 2015 1 The Story Opera)ng systems are a major enterprise within compu)ng. They are hosted on over a billion devices connected to the
More informationPANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014
PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014 Goal of the Panel Engage the workshop par/cipants in an interac/ve discussion of the experimenta/on capabili/es and
More informationAnnouncements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris
Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,
More informationIntelligent Content- Aware Data Priori2za2on and Synchroniza2on across Disconnected, Intermi<ent, Limited (DIL) Networks
Intelligent Content- Aware Data Priori2za2on and Synchroniza2on across Disconnected, Intermi
More informationDistributed Systems INF Michael Welzl
Distributed Systems INF 3190 Michael Welzl What is a distributed system (DS)? Many defini8ons [Coulouris & Emmerich] A distributed system consists of hardware and sodware components located in a network
More informationGeIng Deeper Insights into your and Storage with Splunk
Copyright 2014 Splunk Inc. GeIng Deeper Insights into your Virtualiza@on and Storage with Splunk Stela Udovicic Sr. Product Marke@ng Manager, Splunk Michael Donnelly Senior SE, Virtualiza@on Technologies
More informationAutonomous Threat Hun?ng With Niddel And Splunk Enterprise Security: Mars Inc. Customer Case Study
Copyright 2016 Splunk Inc. Autonomous Threat Hun?ng With Niddel And Splunk Enterprise Security: Mars Inc. Customer Case Study Alex Pinto Chief Data Scien?st, Niddel Greg Poniatowski Security Service Area
More informationToday s Objec2ves. AWS/MR Review Final Projects Distributed File Systems. Nov 3, 2017 Sprenkle - CSCI325
Today s Objec2ves AWS/MR Review Final Projects Distributed File Systems Nov 3, 2017 Sprenkle - CSCI325 1 Inverted Index final input files have been posted Another email out to AWS Google cloud Nov 3, 2017
More informationPersonal Travel Assistant A Multi-Agent Approach
BABEŞ-BOLYAI UNIVERSITY CLUJ-NAPOCA FACULTY OF MATHEMATICS AND COMPUTER SCIENCE SPECIALIZATION COMPUTER SCIENCE DIPLOMA THESIS Personal Travel Assistant A Multi-Agent Approach Supervisor Prof. univ. dr.
More informationSmart Buildings as Cyber- Physical Systems (CPS) In Smart Cities: Living Building
Smart Buildings as Cyber- Physical Systems (CPS) In Smart Cities: Living Building Dr. Driss Benhaddou Associate Professor and Fulbright Scholar University of Houston, TX dbenhaddou@uh.edu Tuesday, 01/05/2016
More informationgeoff.thorpe@nxp.com:/microcontrollers/r&d/security Software Involvement in open source around security and networking (OpenSSL member) Interests in security scalability Member of Zephyr governance board
More informationClinical Metadata A complete metadata and project management solu6on. October 2017 Andrew Ndikom and Liang Wang
A complete metadata and project management solu6on. October 2017 Andrew Ndikom and Liang Wang 1 Agenda How is metadata currently managed within the industry? Five key problems with current approaches.
More informationProject Title: IoT Open Innova:on
ASEAN IVO 2016 The widespread usage of smart phones and smart devices in the network today has transformed the network into a connected web of smart devices. These devices are made smart by the applica:ons
More information10 Things to Consider When Using Apache Ka7a: U"liza"on Points of Apache Ka4a Obtained From IoT Use Case
10 Things to Consider When Using Apache Ka7a: U"liza"on Points of Apache Ka4a Obtained From IoT Use Case May 16, 2017 NTT DATA CorporaAon Naoto Umemori, Yuji Hagiwara 2017 NTT DATA Corporation Contents
More informationClocker. Deploying Complex Applica3ons on Docker using Apache Brooklyn
Clocker Deploying Complex Applica3ons on Docker using Apache Brooklyn Deploying Complex Applica1ons on Docker using Apache Brooklyn Andrew Kennedy @grkvlt ApacheCon, November 2014 Budapest, Hungary Introduc1on
More informationEnterprise Architecture CS 4720 Web & Mobile Systems
Enterprise Architecture Web & Mobile Systems The Concept of a Web Service Each service is built around a func=on/feature That func=on is surrounded by a specified set of protocols (SOAP, POX, WSDL, WSD,
More informationDeveloping an IDE4L Grid
Developing an IDE4L Grid Presenter: Antonino Riccobono, Ph.D. RWTH Aachen University Project Coordinator: Prof. Sami Repo Tampere University of Technology 5 th November 2014 SLIDE 2 Contents Overview of
More informationArchitecture of So-ware Systems Distributed Components, CORBA. Mar>n Rehák
Architecture of So-ware Systems Distributed Components, CORBA Mar>n Rehák CORBA is OMG's open, vendor- independent specifica9on for an architecture and infrastructure that computer applica9ons use to work
More informationSequen&al Consistency and Linearizability
Sequen&al Consistency and Linearizability (Or, Reasoning About Concurrent Objects) Acknowledgement: Slides par&ally adopted from the companion slides for the book "The Art of Mul&processor Programming"
More informationECE 1749H: Interconnec1on Networks for Parallel Computer Architectures: Interface with System Architecture. Prof. Natalie Enright Jerger
ECE 1749H: Interconnec1on Networks for Parallel Computer Architectures: Interface with System Architecture Prof. Natalie Enright Jerger Systems and Interfaces Look at how systems interact and interface
More informationTerraSwarm. A Machine Learning and Op0miza0on Toolkit for the Swarm. Ilge Akkaya, Shuhei Emoto, Edward A. Lee. University of California, Berkeley
TerraSwarm A Machine Learning and Op0miza0on Toolkit for the Swarm Ilge Akkaya, Shuhei Emoto, Edward A. Lee University of California, Berkeley TerraSwarm Tools Telecon 17 November 2014 Sponsored by the
More informationData Model Considerations for Radar Systems
WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,
More informationA Demand Side Management Framework Driven by Ambient Services and Consumer Profiling
A Demand Side Management Framework Driven by Ambient Services and Consumer Profiling Konstan>nos Tsatsakis k.tsatsakis@hypertech.gr Anastasios Tsitsanis HYPERTECH S.A. Mission & Objec>ves Explore alterna1ve
More informationDecentralized K-Means Clustering with Emergent Computing
Decentralized K-Means Clustering with Emergent Computing Ryan McCune & Greg Madey University of Notre Dame, Computer Science & Engineering Spring Simula?on Mul?- Conference 2014, Tampa, FL Student Colloquium
More informationEnterprise Risk Management (ERM) and Cybersecurity. Na9onal Science Founda9on March 14, 2018
Enterprise Risk Management (ERM) and Cybersecurity Na9onal Science Founda9on March 14, 2018 Agenda Guiding Principles for Implementing ERM at NSF (Based on COSO) NSF s ERM Framework ERM Cybersecurity Risk
More informationData-Driven Network Opera1ons. France-IX 2016 Avi Freedman
Data-Driven Network Opera1ons France-IX 2016 Avi Freedman Summary Why Data-Driven Network Opera1ons? The food: data types and sources Requirements and tool types Data Fusion Business-driven use cases:
More informationStream and Complex Event Processing Discovering Exis7ng Systems: esper
Stream and Complex Event Processing Discovering Exis7ng Systems: esper G. Cugola E. Della Valle A. Margara Politecnico di Milano gianpaolo.cugola@polimi.it emanuele.dellavalle@polimi.it Univ. della Svizzera
More informationOutline Multi-agent Platforms. Existing problems. Existing problems (2)
Multi-agent Platforms Cosmin Carabelea Why multi-agent platforms? Examples of multi-agent platforms Cosmin.Carabelea@emse.fr SMA/SIMMO ENS Mines Saint-Etienne September 30 th, 2003 1 2 Existing problems
More informationA Compiler and Run- 1me System for Network Programming Languages
A Compiler and Run- 1me System for Network Programming Languages Christopher Monsanto, Princeton Nate Foster, Cornell Rob Harrison, West Point David Walker, Princeton 1 SoFware- Defined Networks Controller
More informationAgent Architectures & Languages. Heikki Helin
Agent Architectures & Languages Heikki Helin Agent Architectures Introduction Different architectures Deliberative approach Reactive approach Hybrid approach Agent Architectures Definition Maes: An architecture
More information1/12/11. ECE 1749H: Interconnec3on Networks for Parallel Computer Architectures. Introduc3on. Interconnec3on Networks Introduc3on
ECE 1749H: Interconnec3on Networks for Parallel Computer Architectures Introduc3on Prof. Natalie Enright Jerger Winter 2011 ECE 1749H: Interconnec3on Networks (Enright Jerger) 1 Interconnec3on Networks
More informationCSC 5991 Cyber Security Prac1ce
CSC 5991 Cyber Security Prac1ce Fengwei Zhang Wayne State University CSC 5991 Cyber Security Prac1ce 1 Who Am I? Fengwei Zhang Assistant Professor of Computer Science Office: Maccabees Building, Room 14109.3
More informationProcess dependability. Barbara Pernici Politecnico di Milano
1 Process dependability Barbara Pernici Politecnico di Milano Process dependability Design of Coopera6ve IS STAKEHOLDERS FAILURES Adap6ve systems Process dependability BPM SERVICE COMPOSITION Diagnosis
More informationIP CREW. Cogni,ve Radio Experimenta,on World
IP CREW Cogni,ve Radio Experimenta,on World 1st open call - informa,on session Ingrid Moerman Brussels, September 14, 2011 The research leading to these results has received funding from the European Union's
More informationStream and Complex Event Processing Discovering Exis7ng Systems:c- sparql
Stream and Complex Event Processing Discovering Exis7ng Systems:c- sparql G. Cugola E. Della Valle A. Margara Politecnico di Milano cugola@elet.polimi.it dellavalle@elet.polimi.it Vrije Universiteit Amsterdam
More informationStorage Workload Isolation via Tier Warming: How Models Can Help
Storage Workload Isolation via Tier Warming: How Models Can Help By Ji Xue, Feng Yan, Alma Riska, and Evgenia Smirni Presented By Christian Contreras Proposed solution Storage workload prediction model
More informationMain Points. Address Transla+on Concept. Flexible Address Transla+on. Efficient Address Transla+on
Address Transla+on Main Points Address Transla+on Concept How do we convert a virtual address to a physical address? Flexible Address Transla+on Segmenta+on Paging Mul+level transla+on Efficient Address
More informationUrb- IoT Developing a RESTful Communica>on Protocol and an Energy Op>miza>on Algorithm for a Connected Sustainable Home
Urb- IoT 2014 Developing a RESTful Communica>on Protocol and an Energy Op>miza>on Algorithm for a Connected Sustainable Home So$rios D. Kotsopoulos, Federico Casalegno, Wesley Graybill, Adrià Recasens
More informationToday s Objec2ves. Kerberos. Kerberos Peer To Peer Overlay Networks Final Projects
Today s Objec2ves Kerberos Peer To Peer Overlay Networks Final Projects Nov 27, 2017 Sprenkle - CSCI325 1 Kerberos Trusted third party, runs by default on port 88 Security objects: Ø Ticket: token, verifying
More informationDISTRIBUTED DATABASES
DISTRIBUTED DATABASES INTRODUCTION: Database technology has taken us from a paradigm of data processing in which each application defined and maintained its own data, i.e. one in which data is defined
More informationECE 1749H: Interconnec1on Networks for Parallel Computer Architectures. Introduc1on. Prof. Natalie Enright Jerger
ECE 1749H: Interconnec1on Networks for Parallel Computer Architectures Introduc1on Prof. Natalie Enright Jerger Winter 2011 ECE 1749H: Interconnec1on Networks (Enright Jerger) 1 Interconnec1on Networks
More informationFrom Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on
Distributed Embedded Systems University of Paderborn From Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on Falko Dressler dressler@ccs-labs.org Science Brunch, Zurich From Connected
More informationApplications of Secure Coding in Distributed Storage and Wireless Networking
Applications of Secure Coding in Distributed Storage and Wireless Networking Reza Curtmola New Jersey Institute of Technology Parts of this presentation are based on joint work with Bo Chen, Randal Burns,
More informationStay Informed During and AEer OpenWorld
Stay Informed During and AEer OpenWorld TwiIer: @OracleBigData, @OracleExadata, @Infrastructure Follow #CloudReady LinkedIn: Oracle IT Infrastructure Oracle Showcase Page Oracle Big Data Oracle Showcase
More informationSurvey of MAS Methods and Platforms focusing on organizational concepts
Survey of MAS Methods and Platforms focusing on organizational concepts Estefanía Argente Adriana Giret Soledad Valero Vicente Julián Vicente Botti Departamento de Sistemas Informáticos y Computación,
More informationKaseya Advanced Workshop DAY TWO
Kaseya Advanced Workshop DAY TWO Developed by Kaseya University Powered by IT Scholars 1 Kaseya Version 6.2 Last updated on June 25, 2012 Day One Roadmap! Advanced Agent Procedures Day Two Advanced Monitoring
More informationA self Adaptive Security Framework for Networked Control Systems Term Paper Presentation CS 788 Fall 2015 Instructor: Professor Daniel A.
A self Adaptive Security Framework for Networked Control Systems Term Paper Presentation CS 788 Fall 2015 Instructor: Professor Daniel A. Menasce By Eniye Tebekaemi November 30, 2015 OUTLINE Introduction
More informationNetworking: Hardware, Rou?ng and new Challenges
Mestrado em Engenharia Informá?ca e de Computadores Master Degree (MSc) in Informa?on Systems and Computer Engineering Administração e Gestão de Infra-estruturas de IT IT Infrastructure Management and
More information